General
-
Target
wf4780.exe
-
Size
2.8MB
-
Sample
230507-lcq7csfh8w
-
MD5
ec4951e9f2b1945815954fec161cf57a
-
SHA1
8e9e6857a0251a89b9c43b650344fb4f1648fa76
-
SHA256
d969fc2e15743d6d44f477907368f2ebc96cefba20a232861fc7337bfa938d75
-
SHA512
596e28d3529be33483589973ac34410f574cd888bda74e1e24afb2a2de107af4e788e2a27648da3c4fe4db4f49184244ce6ccf50f480c95c8d252d541587ad15
-
SSDEEP
49152:y/Cbs48/vm/XpRDVHFZuAzG5LfvUza32ehyfT36:y/Ob8/vm/XnDVHbs
Behavioral task
behavioral1
Sample
wf4780.exe
Resource
win7-20230220-en
Malware Config
Extracted
quasar
1.4.0
X
45.141.27.208:4780
127.0.0.1:4780
d6e77ea9-bff7-4566-b4dd-f1be3c293c5e
-
encryption_key
57F667877C1FCDA6663E2FDAC6FB8CFDE3CEA957
-
install_name
winx.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
winx
-
subdirectory
sys
Targets
-
-
Target
wf4780.exe
-
Size
2.8MB
-
MD5
ec4951e9f2b1945815954fec161cf57a
-
SHA1
8e9e6857a0251a89b9c43b650344fb4f1648fa76
-
SHA256
d969fc2e15743d6d44f477907368f2ebc96cefba20a232861fc7337bfa938d75
-
SHA512
596e28d3529be33483589973ac34410f574cd888bda74e1e24afb2a2de107af4e788e2a27648da3c4fe4db4f49184244ce6ccf50f480c95c8d252d541587ad15
-
SSDEEP
49152:y/Cbs48/vm/XpRDVHFZuAzG5LfvUza32ehyfT36:y/Ob8/vm/XnDVHbs
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-